Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
Redline.Stealer.v30.2.Cracked.rar
Resource
win10v2004-20250314-en
General
-
Target
Redline.Stealer.v30.2.Cracked.rar
-
Size
47.3MB
-
MD5
6ccff43d453859b019795cf3e8fbc4e0
-
SHA1
17bc784760bed5ea52175eeb90c940bb552e99be
-
SHA256
c6977344d1f554b219939e24dff20b211c948ee59d750e37b67dbc0557b10bd0
-
SHA512
9d71b5d9e0e380216599b56669e25ff1f86132c1b8e019b1ceadc9693796075bde49b60514d272aeb7245d38b8c247ad62df7f63704d9e2b19a4f1b4c7ed6cfb
-
SSDEEP
786432:HsCCAWDbN+bjAL5nwg9bssUo3TR2w6q/bIyQp0DNcYna070CZBTwNfgYAN2Sja8e:HsCChojA1nwITTMYbIyQGGYnr0GBcNf9
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000c000000024121-120.dat family_redline behavioral1/memory/112-122-0x0000000000820000-0x0000000000874000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Panel.exe -
Executes dropped EXE 3 IoCs
pid Process 4208 Panel.exe 4552 Panel.exe 112 RedlineBuilder.exe -
Loads dropped DLL 2 IoCs
pid Process 112 RedlineBuilder.exe 112 RedlineBuilder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedlineBuilder.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1644 ipconfig.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5968 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4208 Panel.exe 4208 Panel.exe 4552 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4208 Panel.exe 4552 Panel.exe 4552 Panel.exe 4208 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe 4552 Panel.exe 4208 Panel.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5816 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 5816 7zFM.exe Token: 35 5816 7zFM.exe Token: SeSecurityPrivilege 5816 7zFM.exe Token: SeRestorePrivilege 4584 7zG.exe Token: 35 4584 7zG.exe Token: SeSecurityPrivilege 4584 7zG.exe Token: SeSecurityPrivilege 4584 7zG.exe Token: SeRestorePrivilege 4112 7zG.exe Token: 35 4112 7zG.exe Token: SeSecurityPrivilege 4112 7zG.exe Token: SeSecurityPrivilege 4112 7zG.exe Token: SeDebugPrivilege 4208 Panel.exe Token: SeDebugPrivilege 4552 Panel.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 5816 7zFM.exe 5816 7zFM.exe 4584 7zG.exe 4112 7zG.exe 4552 Panel.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4552 4208 Panel.exe 115 PID 4208 wrote to memory of 4552 4208 Panel.exe 115 PID 5340 wrote to memory of 1644 5340 cmd.exe 125 PID 5340 wrote to memory of 1644 5340 cmd.exe 125
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Redline.Stealer.v30.2.Cracked.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5816
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\" -spe -an -ai#7zMap32175:116:7zEvent289551⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4584
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4340
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Password.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5968
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\" -an -ai#7zMap15409:248:7zEvent32261⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4112
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe" "--monitor"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4552
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:1644
-
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe"C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\builder.bat" "1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47.3MB
MD57bab0db9d2a49a5ad6791b6a45d5da9e
SHA1d497aaf2b289550045d62e7403800b3207e5c9b7
SHA256ab91a351bc3d529f796a789a370bd95c74390d1e2439dd8f7c4b56439e8fcb68
SHA512937b158b90c5ae3d685d907afd8c147dd8fd1c8df69565404d38492ce3c1d825c804f1d6386e9285802c73d1696890c6c96895313502d68e7f2058560996f97e
-
Filesize
50KB
MD542d66964ee6b3aa7710f07803f2e9565
SHA11af7fdf8b45f0003810c3b0c13e982c5c865d557
SHA25605e0e8394154edf4366d6af144934a7014a0ad06f571dfd1e132d7099c8118e9
SHA512311cd9febd10db76e101a059410ddc4af35916ac88dda0719dd5e4f2473bcc8485161da576f9512f73716258e19f53b61515875ad0c590d1c8854ccfb525d8eb
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\IPLocator.dll
Filesize34KB
MD5c8b0ac355a4eccd2390775fd4f2f72bc
SHA1a56a296cf3a9b82a02db244a4112954b2f79f59e
SHA2560d1dc8a4030f457fd6323b3646f1ad8e062e2afb17845a6ffa29795dc618bb4d
SHA51273e5dc0f863ce8f17bdc9166cdae0b35f115c1f4cc247be0c07d8dd2e8dba19c24827ce1989136247732cd28380b89eb843d736f67f93304bce7adf546558621
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\MetroSet UI.dll
Filesize436KB
MD55aeea45913eb8475077a9547d7d3f2f3
SHA109931075a4fdffe7b051df6d3bc5b4a0bacdf019
SHA256ef2a67849fbe0f1c99263bf0acfddf15a1b3668e49fd9d35868e147d8a4c8c73
SHA5123f3ba1d117784aca8d6abfe84e9275da425fd23982aa1ce9af760a9e5d7cd5e9dc2e36a36cc6e190cb91e8b2c8888881cfd8feeb85c3249185d61273a1a1e0ff
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Newtonsoft.Json.Schema.dll
Filesize208KB
MD5260a18bcc6d697d5c9f42299f2f34195
SHA1de566fe1aa6d98310ddfa9d0773d1bdf47675c37
SHA256b3cc57a64a89017c294927d93a24d10e5863287cdf32bd0f173386d3caebf5a8
SHA5120451e2027ce21d1e7ed5267917b49c27f1e264ef58512d489da5d4359b62ceb7971ab2adec569a0626d9bcdeeae1f1f4744b5d0c8e1158a2af70c1e03d2cae29
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Newtonsoft.Json.dll
Filesize683KB
MD56815034209687816d8cf401877ec8133
SHA11248142eb45eed3beb0d9a2d3b8bed5fe2569b10
SHA2567f912b28a07c226e0be3acfb2f57f050538aba0100fa1f0bf2c39f1a1f1da814
SHA5123398094ce429ab5dcdecf2ad04803230669bb4accaef7083992e9b87afac55841ba8def2a5168358bd17e60799e55d076b0e5ca44c86b9e6c91150d3dc37c721
-
Filesize
12.1MB
MD585afedf22ca7d0561be4443e854459a7
SHA11fec08de68672a302f0df40ff30b22cee4d18057
SHA256130a2379f8f07cec2cd9935bdf67bfcfbb977327f89f017dc16f19efc871d864
SHA512e5229c4e67bc7d4ef8b53c94cfd017833797ecb52a93d71e9770ae50aaaa8e3e6c9b6433389f85255c2fe92bf94bdf1f6d1c49a01ac0809d7c8ccdb8c07dce03
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Panel.exe.config
Filesize26KB
MD514c52be5c2f2e05b34c971ab1c5a1f6e
SHA1ca6af3aeef6b4f7d0b9d9199b985251d29aa65e2
SHA25646de03cb4b125529c7aaf6024d3a287fb7c01bc5514664aae89d1a2f05af951a
SHA5129266c85eb86115eef864e18bc46a5d2aae82e81ddbffc1589bad308ab1f7122d8a92bb5260e957a97350190bcaad27e93ad2bc1f7db1aaddc1c44a80dc728108
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Password.txt
Filesize18B
MD5b6ce586d5cb92ad00f46923ce5263a52
SHA1bf114989fe5c181ad1bb5b590be1e0b85bb5e808
SHA2562079244811531293a5117b8924a53bf731721c6644f988f5132fa038cf857cb4
SHA5123a66eb140fba06fad68739a183ee949354bf84c3f6569d9b9b993c1e1e0db414127c9b14d2b4a13b5c264098d19008f6990cf95e663d195075a25dc1e09f9ca1
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Pluralsight.Crypto.dll
Filesize45KB
MD54ae6096005c37982c8b0c7b465d88da5
SHA193486afd78d1dba82722bee3ff7661e4740b9f05
SHA256e3e598d322d72e6b717f6753d02d8f98a5436e884adbc0cc383e7a39a3c35b04
SHA51286b52ab17120ec7c2941b7598c2b90ed8bce6f4c11a5c3e6e026c60f976ed58b042a8495c16f2a6a4dee8463da788a90ff6008069a133f566862afcc8ab65642
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\Redline.Stealer.v30.2.Cracked.exe
Filesize47.5MB
MD5e3e8f26932b46bc402f3f47e52508226
SHA1e762b2a2f1a25aebe6d41c6cb77c6ba31ed87c7a
SHA256ee2d016a2c09c57286271e83b37de5bb335ab9c9c56f278c5fdbb6e4076dbabb
SHA5128b296d82ae7ac1baa101b1edb1e33d34a8124b2515ef282e810d4b3f7c002724ed5132c54fe6627d4be25fe78716e20ff75bfbc66a498c4f49b6e3311087f651
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\WindowsFirewallHelper.dll
Filesize73KB
MD5a37d8988990b3843182c51f1b9e5be4c
SHA1d91b359403b3522cf718114174791b7b5c4de508
SHA2562d8800d0ab20711af316fca20244cc06261a15021b2a78ac3ec6bd489f352594
SHA51290776764006741cf54d1e29796de19f01845148bd1f9770ebc9205e02fd53987a0250f0c23409acd8bea573cfcbc48b6b7614e7726d484f1ab64682740f392a6
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\RedlineBuilder.exe
Filesize308KB
MD5128cbb0f113189a8af347f14cb223357
SHA17472ff8bcf4b6ab90e30ec0352f0ecb44c655cf7
SHA256a392dc6ad27dbc999aef5db8efaa63a65e570ca3bff7a79c5053ce7b7ba41a0e
SHA5121bddf607e1e8ef32d39e16fcb9d9d87573f61ceee9a898c287ad236beaea818b223a28196395145a7b3eca5883e5da5b3a3dc0273fd66d64e103c24739868b35
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\builder.bat
Filesize581B
MD55bffd9e309e1d362608a5188a0f0cdba
SHA1d87cca8b89fc5cc4e77453a8aa03a058c8b5e85b
SHA2566fa6de2709d0e38c8b651747cd37f73262118c005ae89e37b80cce0eaad1ff88
SHA5128e9b6e0d479b7ea7a1cebd41deb59a13beccf36552388c41ddaf341021a0d62c972846a665cb30948e84981828ec5622570a46bcdb48a8cb6ae0a9991acd5989
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\builder\dnlib.dll
Filesize1.1MB
MD53d913aab7b1c514502c6a232e37d470e
SHA128ac2d1519ec5ea58b81fe40777645acc043b349
SHA256bdb84aa16678189510def7c589851f6ea15e60ff977ea4c7c8c156504e6ac0ff
SHA512311e8f73c52dd65cbaf9f6e008b3231090ea99edf3471bac63cca4156a37a0d874ac590b19c01b15e05345bb6a5b636a11698bbd4e88c59c138dd3f358800027
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\panelSettings.json
Filesize5KB
MD5346419d2a3f9f87e978adf74e99b61f7
SHA18dce4be68e65729c10c152fc9106117b49da8554
SHA256f98125103ff50480a43581c4151f7b860595aaf4e91e781c4526916964ea3ced
SHA5123dca4d30ac090f55d29157ebd1cb9885a2e2786eaa14c26f69a5f758ad82fa29d40e2ff7ba6c3999c251ba83225435ebbdccc8019bfceef54769e99dd25a4c1c
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\protobuf-net.dll
Filesize274KB
MD5d16fffeb71891071c1c5d9096ba03971
SHA124c2c7a0d6c9918f037393c2a17e28a49d340df1
SHA256141b235af8ebf25d5841edee29e2dcf6297b8292a869b3966c282da960cbd14d
SHA51227fb5b77fcadbe7bd1af51f7f40d333cd12de65de12e67aaea4e5f6c0ac2a62ee65bdafb1dbc4e3c0a0b9a667b056c4c7d984b4eb1bf4b60d088848b2818d87a
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\serviceSettings.json
Filesize73B
MD5f9d5b6cb3abf194a7d4174fb5114fc24
SHA1b62700cf1b734926f14d9b05382270c4f868b181
SHA256ae0f138e5860dc597e29566588fc9e64df46fc4407591bb549fbd642eab0f6c7
SHA51296464a563b524ecb32154b4180772e3b6af5935684818b5f0b9f38f63c458f71498bce775c78db3bc7c279ee7dcf86d013f51f61cd8df4b23e426bd907f08c7d
-
Filesize
174B
MD50f91aea181cd167baad6ef0f2f07176d
SHA1924f29e47a17e4933a4d8db2627344657acbca20
SHA25660f69cf6704a36cfdb8ca2b1304db90b8dc60ff1364ff225c9c97c928b4577cf
SHA512025ecaaeb9972978792c86a5c5f0d4aa53dfcaf30ea867808cd398ed7ab1acf53e179393aeab0424bd23115fc267723d4fcb70107347fbb8ad3f1ff8e9c3d3dd
-
C:\Users\Admin\Desktop\Redline.Stealer.v30.2.Cracked\Redline.Stealer.v30.2.Cracked\Panel\telegramChatsSettings.json
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af